US11641344B2 - Secure remote maintenance devices and method, for remote maintenance of industrial equipment - Google Patents
Secure remote maintenance devices and method, for remote maintenance of industrial equipment Download PDFInfo
- Publication number
- US11641344B2 US11641344B2 US16/979,945 US201916979945A US11641344B2 US 11641344 B2 US11641344 B2 US 11641344B2 US 201916979945 A US201916979945 A US 201916979945A US 11641344 B2 US11641344 B2 US 11641344B2
- Authority
- US
- United States
- Prior art keywords
- network
- industrial
- internet
- type data
- data network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/082—Access security using revocation of authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Definitions
- the invention relates to the remote maintenance of industrial equipment, particularly that involved in the manufacture of aeronautical systems such as turbine engines.
- the latter In order to manage the maintenance of this equipment, the latter is connected to a network, which is connected to a remote maintenance server to which an intervener can connect, provided that an entitled person authorizes his access.
- One solution for allowing remote access at any time is to permanently connect the equipment to a remotely accessible network.
- the invention allows the mitigation of the aforementioned disadvantages.
- the invention relates, according to a first aspect, to a housing for managing access to an industrial network, to which industrial equipment is connected, the management housing comprising: a channel for access to an Internet-type data network, said channel for access to the data network comprising a cut-off unit, a channel for controlling the channel for access to the data network, said control channel comprising a controller configured to control the cut-off unit so as to allow communication between the industrial network and the data network.
- the invention relates, according to a second aspect, to a remote maintenance server configured to be connected, on the one hand, to an industrial network to which a set of industrial equipment is connected and, on the other hand, to a housing according to the invention, the server comprising a control server configured to communicate with the housing, said server also comprising a firewall configured to manage access to the industrial network from said housing.
- the invention is advantageously completed by the feature according to which the firewall is configured to isolate a certain industrial equipment from the other equipment of the network so as to allow access to the isolated equipment only, without being able to gain access to the others.
- the invention relates, according to a third aspect, to a method for remote maintenance of a set of industrial equipment connected together to an industrial network, the industrial network being connected with a housing for managing access to an industrial network according to the first aspect of the invention, the management housing being connected with a data network and a mobile network, the method comprising the following steps, an anomaly having been detected on a unit of the set, called the unit of interest: receiving on the control channel of the housing a request for the purpose of establishing a remote maintenance communication between the industrial network and the data network, authenticating the request, and if the request is authenticated, establishing the remote maintenance communication between the industrial network and the data network.
- the invention allows a person entitled to control the remote maintenance solution to set in place secured remote maintenance connections so that a maintenance operator, who is therefore entitled, can connect and perform maintenance or breakdown service of industrial equipment at any time and from any location throughout the world.
- the housing integrated into a system allowing remote maintenance to be accomplished can be controlled remotely via a mobile, particularly a cellular network (GSM network) while having high security.
- GSM network cellular network
- the housing allows the opening of an electronic circuit allowing the connection between the remote maintenance server and a data network.
- the opening can be accomplished locally or via a mobile network, this then allows the maintenance operator to securely gain access to industrial equipment.
- FIG. 1 shows a remote maintenance environment conforming to the invention
- FIG. 2 illustrates steps of a remote maintenance method according to the invention.
- industrial equipment U 1 , U 2 , U 3 is connected to an industrial network 10 .
- An industrial network 10 of this type is well known to a person skilled in the art and will not be detailed further here.
- a remote maintenance server 20 is connected to the industrial network 10 .
- a server 20 of this type allows verifying the security of maintenance communications relative to the industrial equipment of the industrial network 10 .
- the remote maintenance server 20 allows managing access to the industrial network and therefore access to the industrial equipment connected to it. It is by means of this remote maintenance server 20 that the maintenance operations as such are accomplished.
- the server 20 comprises a control server 21 configured to communicate with the housing 30 , and also comprises a firewall 22 allowing filtering the connections depending on the intervention to be carried out on certain industrial equipment. Thanks to the firewall 22 , the remote maintenance server 20 allows isolating a certain industrial equipment from the other equipment of the network so that a user terminal can gain access only to the isolated equipment without being able to gain access to others.
- a housing for managing access to the industrial network is connected to the remote maintenance server 20 .
- This housing 30 allows managing access by an intervener for the remote maintenance of the industrial network 10 via the remote maintenance server 20 by means of a communication terminal 50 ′.
- the housing 30 allows the opening and the closing of remote maintenance communication in order to be able to perform remote breakdown service on industrial equipment of the industrial network 10 by means of an Internet-type data network 40 .
- a mobile network 70 of the GSM type, that an entitled person, via his terminal 50 , can trigger a remote maintenance communication for an authorized maintenance intervener or for himself.
- an authorized maintenance operator of the entitled person can connect to the industrial network 10 via the data network 40 , by means of a terminal 50 , 50 ′, for the purpose of performing breakdown service on certain industrial equipment U 1 , U 2 , U 3 of the network 10 .
- one terminal 50 is considered to be for the entitled person and another terminal 50 ′ for the maintenance operator, so that they are two different persons, but the invention also applies to the case where the entitled person opens the remote maintenance communication for himself.
- the housing allows two distinct connections: one connection to a data network 40 and another connection to a mobile network 70 .
- one terminal 50 , 50 ′ is for example a smartphone, a tablet or even a mobile computer. It will be understood, however, that for the establishment of the remote maintenance communication via the mobile network 70 , the terminal is able to connect to such a network. Just as for the terminal for performing the remote maintenance via the data network 40 , the terminal is able to connect to a data network of this type.
- the management housing 30 comprises a channel 30 a for access to an Internet-type data network and a channel 30 b for controlling said channel 30 a for access to the data network.
- control channel 30 a comprises a first communication interface 32 allowing access to a GSM type wireless network 70 .
- the channel 30 a for access to the data network comprises a second communication interface 34 allowing access to an Internet-type data network 40 .
- the management housing 30 is preferably both connected to a wired mobile network 70 (of the GSM type for example) and to an Internet-type data network 40 .
- the housing 30 has two distinct functionalities.
- the first functionality is that of controlling via the control channel 30 b the opening or the closing of the remote maintenance communication between the industrial network 10 and the data network 40 .
- the opening or the closing of the remote maintenance communication as such being carried out by means of the channel 30 a for access to the data network 40 .
- the second functionality is to secure access to the industrial network 10 .
- the channel 30 a for access to the data network 40 comprises a cut-off unit 33 configured to physically isolate the industrial network 10 from the data network so that no communication can be established from the data network 40 .
- the control channel 30 b comprises a controller 31 configured to control the cut-off unit 33 so as to allow access to the industrial network 10 from the data network 40 and thus establish a remote maintenance communication.
- the firewall 22 of the remote maintenance server 20 also has the functionality of communicating with the controller 31 of the cut-off housing 30 in order to authorize or not the opening of the remote maintenance communication.
- the controller 31 is connected with the remote maintenance server 20 and with the first communication interface 32 .
- connections between the first communication interface 32 and the controller 31 , on the one hand, and between the controller 31 and the remote maintenance server 20 are known connections of the RS232 type.
- the opening and the closing of the remote maintenance communication are managed by the control channel 30 b .
- a request for the purpose of establishing remote maintenance communication originating in the mobile network 70 must be authenticated. This request emanates from an entitled person.
- An authentication of this type is implemented by the controller 31 which processes the information received from the first communication interface 32 and transmits them to a server 21 for controlling the remote maintenance server 20 .
- the control server 21 comprises a memory (not shown) in which a list of authorized interveners is stored.
- the controller 31 is therefore configured to implement a comparison between the data of the control service 21 and the data relating to the identity of the person having emitted the request for establishing the remote maintenance communication.
- the first communication interface 32 is a GSM communication interface comprising a SIM card in order to be able to connect the management housing 30 to a mobile network of a GSM operator.
- the entitled person can send his request for the purpose of opening the remote maintenance communication via the sending of an SMS.
- the transmitted SMS responds to a very particular syntax allowing identifying the entitled person and also comprising the control command which will be transmitted by the controller 31 to the control service 21 .
- the SMS comprises a confidential code typically consisting of 8 numerals which allows authenticating the entitled person.
- the SMS is advantageously composed of three fields:
- the control command is a command of a particular industrial equipment item U 1 , U 2 , U 3 to allow its maintenance via the remote maintenance communication. It consists, in other words, of a command applied to a certain equipment for the purpose of allowing its remote maintenance.
- the controller 31 is therefore configured to process the request received (the SMS) in order to compare the identity which it contains to the list of entitled persons stored in the memory of the control server 21 (in the case of the SMS, verification of the identity will be implemented thanks to the telephone number from which the SMS originated and thanks to the confidential code contained in the SMS).
- the controller 31 generates a control signal which allows controlling the cut-off unit 33 in order for the latter to place the industrial network 10 into communication with the data network 40 by means of the second communication interface 34 .
- the cut-off unit 33 comprises an electronic relay allowing physical cut-off between two RJ45 communication ports of which one is connected to the remote maintenance server 20 by means of a security gateway 22 and the other to the internet data network 40 .
- a control signal originating in the controller 31 adapted to the relay the connection or the disconnection of the two communication ports is controlled.
- the relays being controlled by a 12 Vcc signal, the control (5 Vcc) signal originating in the controller is adjusted via an electronic voltage amplifier.
- the cut-off unit 33 can be locally controlled in order to allow the opening or the closing of the circuit without passing through the SMS mode.
- authentication is carried out directly, locally and not remotely, by sending a request to the controller 31 via the control service 21 of the server.
- a remote maintenance method implemented in the environment of FIG. 1 described above is described with reference to FIG. 2 .
- step E 0 an anomaly on a certain industrial equipment of the industrial network 10 is detected and communicated to the maintenance service of the industrial site.
- the maintenance service If the maintenance service has an interest in a remote maintenance communication for having additional remote support, it carries out the opening or asks an entitled person to proceed with the establishment of a secured remote maintenance communication in order to makes the equipment of the industrial network for which an anomaly is detected remotely accessible.
- the industrial equipment for which an anomaly is detected is called the “equipment of interest.”
- the management housing 30 is in communication with the mobile network 709 and is awaiting reception of a request for the purpose of establishing a remote maintenance communication between the industrial network 10 and the data network 40 .
- the request can consist of the SMS previously described, originating from the entitled person.
- the management housing 30 is solely accessible via the mobile network 70 , or locally if the request is local.
- a request for the purpose of establishing a remote maintenance communication between the industrial network 10 and the data network 40 is received (step E 1 ) by the control channel 30 b .
- the request comprises in particular the identity of the person entitled to request the establishment of the remote maintenance communication.
- the identity consists of the telephone number from which the SMS constituting the request originated.
- This request is then authenticated (step E 2 ). More precisely, the authentication consists in that the controller 31 of the housing 30 compares the identity of the entitled person to a list of persons stored in the control server 21 of the remote maintenance server 20 . In the case of sending the SMS at this step, the system also verifies the confidential code contained in the SMS.
- step E 3 the remote maintenance communication is established.
- the housing 30 via the controller 31 , controls (step 32 ) the cut-off unit 33 to place the industrial network 10 into communication with the data network 40 by means of said cut-off unit 33 .
- the industrial network 10 is in communication with the data network 40 by means of the second communication interface 34 .
- the establishment of the remote maintenance communication comprises, prior to the control of the cut-off unit a step (step 31 ) consisting of isolating the industrial equipment on which an intervention is required on the industrial network 10 from the other industrial equipment. In other words, only the industrial equipment of interest is accessible on the industrial network 10 .
- a maintenance operate can connect (step E 4 ) to the industrial network 10 via the data network 40 by means of his terminal (smartphone, tablet, computer, etc.).
- the entitled person having asked for the opening of the remote maintenance communication transmits to the maintenance operator a connection link of the “URL” type, then identification information. Thanks to this link, the maintenance operator has access to an interface allowing ensuring the maintenance of certain industrial equipment.
- connection of the maintenance operator is accomplished via an Internet-type connection on the remote maintenance server 20 and comprises an authentication.
- This authentication consists of verifying that the intervener who is connecting on the server is the expected one, then authorizing crossing the firewall 22 located on the remote maintenance server 20 .
- a secured connection is then established.
- the management housing 30 allows placing the industrial network 10 into communication with the terminal of the intervener so that the latter can gain access to the equipment of interest. This placing into communication allows the terminal of the intervener to gain access to the equipment of interest through the network 40 in order to carry out maintenance operations.
- the management housing has “physically” connected the industrial network 10 to the internet network 40 .
- step E 5 the intervener carries out (step E 5 ) one or more maintenance operation(s) on the equipment of interest.
- step E 6 the intervener disconnects (step E 6 ) from the industrial network 10 .
- This step E 6 is initiated by the intervener via his terminal.
- the remote maintenance server 20 then controls the controller 31 of the management housing (step E 7 ) so that it controls the cut-off unit 33 in order to again isolate the industrial network 10 from the data network.
- step E 8 all of the industrial equipment is then connected to the industrial network.
- step E 9 is implemented by the remote maintenance server 20 , and consists of tracing the actions carried out by the maintenance operator on the equipment of interest.
- control service 21 records the actions carried out on the industrial network 10 , for example in the form of a video, in order to guarantee the integrity of the production data.
Abstract
Description
-
- the control channel comprises a first communication interface configured to place the housing into communication with a mobile network of the GSM type;
- the cut-off unit comprises a cut-off relay which can be activated by means of a control signal originating in the controller;
- the first communication interface is a GSM communication interface, the control signal being dependent on a received SMS;
- the controller is configured to authenticate a user, the controller being configured to control the cut-off unit in order to establish a communication between the industrial network and the data network, provided that the user is authenticated.
-
- the mobile network is a GSM network, the request consisting of an SMS preferably comprising a confidential code allowing authentication of said request;
- the housing being connected to a remote maintenance server, method in which the establishment of the remote maintenance communication comprises a step consisting of isolating the equipment of interest from the other equipment of the industrial network so that only the equipment of interest is connected to the industrial network;
- the method comprises a step of connecting, by means of the management housing, a terminal of an intervener to the industrial network so that the latter can gain access to the equipment of interest via the data network in order to carry out maintenance operations on said equipment of interest; and once the maintenance operations are completed; the method comprises a step of disconnecting, by means of the management housing, the terminal of the operator from the industrial network, the industrial network no longer being accessible via the internet network;
- the step of connecting the terminal of the intervener comprises authentication of said intervener in order to verify that he is authorized to connect to the industrial network;
- the method comprises a step of restoring the industrial network so that all of the industrial equipment is accessible via the industrial network but inaccessible from the internet network. The advantages of the invention are manifold;
-
- a first field constituted by the confidential code
- a second field constituted by a command for opening or closing the remote maintenance communication
- a third field constituted by the control command of a particular industrial equipment item.
Claims (15)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1852185 | 2018-03-14 | ||
FR1852185A FR3079046B1 (en) | 2018-03-14 | 2018-03-14 | DEVICES AND METHOD FOR SECURE REMOTE MAINTENANCE FOR REMOTE MAINTENANCE OF INDUSTRIAL EQUIPMENT |
PCT/FR2019/050567 WO2019175512A1 (en) | 2018-03-14 | 2019-03-14 | Secure remote maintenance devices and method, for remote maintenance of industrial equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
US20210051133A1 US20210051133A1 (en) | 2021-02-18 |
US11641344B2 true US11641344B2 (en) | 2023-05-02 |
Family
ID=62751035
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/979,945 Active 2039-03-15 US11641344B2 (en) | 2018-03-14 | 2019-03-14 | Secure remote maintenance devices and method, for remote maintenance of industrial equipment |
Country Status (8)
Country | Link |
---|---|
US (1) | US11641344B2 (en) |
EP (1) | EP3766224A1 (en) |
JP (1) | JP7466452B2 (en) |
CN (1) | CN111869181B (en) |
BR (1) | BR112020018260A2 (en) |
CA (1) | CA3093392A1 (en) |
FR (1) | FR3079046B1 (en) |
WO (1) | WO2019175512A1 (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5826014A (en) * | 1996-02-06 | 1998-10-20 | Network Engineering Software | Firewall system for protecting network elements connected to a public network |
US20010044903A1 (en) * | 2000-05-12 | 2001-11-22 | Sumitomo Heavy Industries, Ltd. | Information access method and network system |
US20100165878A1 (en) * | 2008-12-31 | 2010-07-01 | Schneider Automation Inc. | Communication Module with Network Isolation and Communication Filter |
US20140044123A1 (en) * | 2011-05-23 | 2014-02-13 | Twilio, Inc. | System and method for real time communicating with a client application |
CN103926897A (en) * | 2014-04-21 | 2014-07-16 | 南京大树智能科技股份有限公司 | Remote control system of impurity removing machine |
DE102013221164A1 (en) | 2013-10-18 | 2015-05-21 | Siemens Aktiengesellschaft | System, breaker device and monitoring unit for interrupting data communication |
US20170264589A1 (en) * | 2016-03-08 | 2017-09-14 | Tanium Inc. | System and Method for Performing Event Inquiries in a Network |
US20170366521A1 (en) | 2016-06-20 | 2017-12-21 | Ford Global Technologies, Llc | Remote firewall update for on-board web server telematics system |
US20180196615A1 (en) * | 2017-01-10 | 2018-07-12 | Indegy Ltd. | Efficient backup and restore of controller code in industrial control network |
US20180262502A1 (en) * | 2015-09-08 | 2018-09-13 | Siemens Aktiengesellschaft | Method for operating an industrial network and industrial network |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002175224A (en) * | 2000-12-06 | 2002-06-21 | Nec Corp | System and device for connecting network |
SE525304C2 (en) * | 2002-04-22 | 2005-01-25 | Snalle Ab | Method and apparatus for controlling access between a computer and a communication network |
CN1649309A (en) * | 2004-01-20 | 2005-08-03 | 国际商业机器公司 | Network managing method and system and computer |
JP4351949B2 (en) * | 2004-04-23 | 2009-10-28 | 三菱電機株式会社 | Intrusion prevention system |
JP4662080B2 (en) * | 2005-02-24 | 2011-03-30 | 日本電気株式会社 | Filtering rule analysis method and system |
CN101083607B (en) * | 2006-05-30 | 2010-12-08 | 倪海生 | Internet accessing server for inside and outside network isolation and its processing method |
CN101277236A (en) * | 2008-04-23 | 2008-10-01 | 石家庄市科技咨询服务中心 | Remote meter-reading system |
DE102009044525A1 (en) * | 2009-11-13 | 2011-05-19 | Vodafone Holding Gmbh | Releasing a connection through a firewall of a network access device |
CN202929470U (en) * | 2012-12-11 | 2013-05-08 | 西南大学 | Remote data transmission system of industrial equipment |
-
2018
- 2018-03-14 FR FR1852185A patent/FR3079046B1/en active Active
-
2019
- 2019-03-14 BR BR112020018260-5A patent/BR112020018260A2/en unknown
- 2019-03-14 CN CN201980019173.9A patent/CN111869181B/en active Active
- 2019-03-14 WO PCT/FR2019/050567 patent/WO2019175512A1/en unknown
- 2019-03-14 JP JP2020548622A patent/JP7466452B2/en active Active
- 2019-03-14 EP EP19717537.5A patent/EP3766224A1/en active Pending
- 2019-03-14 US US16/979,945 patent/US11641344B2/en active Active
- 2019-03-14 CA CA3093392A patent/CA3093392A1/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5826014A (en) * | 1996-02-06 | 1998-10-20 | Network Engineering Software | Firewall system for protecting network elements connected to a public network |
US20010044903A1 (en) * | 2000-05-12 | 2001-11-22 | Sumitomo Heavy Industries, Ltd. | Information access method and network system |
US20100165878A1 (en) * | 2008-12-31 | 2010-07-01 | Schneider Automation Inc. | Communication Module with Network Isolation and Communication Filter |
US20140044123A1 (en) * | 2011-05-23 | 2014-02-13 | Twilio, Inc. | System and method for real time communicating with a client application |
DE102013221164A1 (en) | 2013-10-18 | 2015-05-21 | Siemens Aktiengesellschaft | System, breaker device and monitoring unit for interrupting data communication |
CN103926897A (en) * | 2014-04-21 | 2014-07-16 | 南京大树智能科技股份有限公司 | Remote control system of impurity removing machine |
US20180262502A1 (en) * | 2015-09-08 | 2018-09-13 | Siemens Aktiengesellschaft | Method for operating an industrial network and industrial network |
US20170264589A1 (en) * | 2016-03-08 | 2017-09-14 | Tanium Inc. | System and Method for Performing Event Inquiries in a Network |
US20170366521A1 (en) | 2016-06-20 | 2017-12-21 | Ford Global Technologies, Llc | Remote firewall update for on-board web server telematics system |
US20180196615A1 (en) * | 2017-01-10 | 2018-07-12 | Indegy Ltd. | Efficient backup and restore of controller code in industrial control network |
Non-Patent Citations (3)
Title |
---|
French Search Report dated Nov. 5, 2018 in Application No. FR 1852185. |
International Search Report dated Jun. 12, 2019 from the European Patent Office in Application No. PCT/FR2019/050567. |
Written Opinion dated Jun. 12, 2019 of the International Searching Authority in Application No. PCT/FR2019/050567. |
Also Published As
Publication number | Publication date |
---|---|
CN111869181A (en) | 2020-10-30 |
JP7466452B2 (en) | 2024-04-12 |
FR3079046A1 (en) | 2019-09-20 |
BR112020018260A2 (en) | 2020-12-29 |
JP2021516017A (en) | 2021-06-24 |
CA3093392A1 (en) | 2019-09-19 |
RU2020133628A (en) | 2022-04-15 |
US20210051133A1 (en) | 2021-02-18 |
EP3766224A1 (en) | 2021-01-20 |
CN111869181B (en) | 2023-01-31 |
WO2019175512A1 (en) | 2019-09-19 |
FR3079046B1 (en) | 2021-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20150024688A1 (en) | Automatic Pairing of a Vehicle and a Mobile Communications Device | |
CN107251106A (en) | The method securely transmitted for virtual key and the mirror method for distinguishing for mobile terminal | |
CN104737177B (en) | method for providing security service | |
CN103477666A (en) | Connecting mobile devices, Internet-connected vehicles, and cloud services | |
US11245523B2 (en) | Method for implementing client side credential control to authorize access to a protected device | |
KR20160121775A (en) | THIRD PARTY'S SECURITY AUTHENTICATION SYSTEM BETWEEN MOBILE DEVICE AND IoT DEVICES AND METHOD THEREOF | |
US11165569B2 (en) | Method and device for securely operating a field device | |
US11431707B2 (en) | Method, device and server for the secure distribution of a configuration to a terminal | |
WO2012174898A1 (en) | Anti-theft platform and client, terminal and mobile terminal anti-theft processing method | |
US20180159854A1 (en) | Secure mobile access for automation systems | |
CN107094169B (en) | Apparatus and method for enhancing telematics security through a supplemental channel | |
US8995992B1 (en) | Method and system for secure mobile device number lookup and modification | |
US11641344B2 (en) | Secure remote maintenance devices and method, for remote maintenance of industrial equipment | |
US20050176408A1 (en) | Method and apparatus for providing for wireless commissioning of network elements | |
US9940116B2 (en) | System for performing remote services for a technical installation | |
KR20190098863A (en) | System of collecting manufacturing facilities data and controlling the manufacturing facilities using iot communication with smart phone | |
RU2780736C2 (en) | Protected devices and method for remote maintenance of industrial objects | |
CN107819786B (en) | QQ authentication-based operating system login system and method | |
KR102467166B1 (en) | Authentication method for accessing a companion device when disconnecting from a subscriber device | |
JP2007140618A (en) | Maintenance server, relay server, remote control system, and user authentication method | |
JP2002232420A (en) | Radio communication equipment radio communication system and connection authenticating method | |
KR102462707B1 (en) | A Method for Authenticating and Communicating between a Device and a Mobile Based on a Public Key in a Mobile Near Field Communication | |
KR101314695B1 (en) | Intranet Security Management System, Blocking Server therefor, and Security Method thereof | |
CN108156157B (en) | Self-adaptive compatible method and device for monitoring equipment | |
WO2020229853A1 (en) | Method for implementing client side credential control to authorize access to a protected device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED |
|
AS | Assignment |
Owner name: SAFRAN AIRCRAFT ENGINES, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NOIRFALISE, PASCAL;BARROUILLET, THIBAUT;BELREPAYRE, SYLVAIN ERIC ALAIN;AND OTHERS;SIGNING DATES FROM 20210216 TO 20210219;REEL/FRAME:055551/0057 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |